网络层物联网安全分析

Rahul Sharma, Nitin Pandey, S. Khatri
{"title":"网络层物联网安全分析","authors":"Rahul Sharma, Nitin Pandey, S. Khatri","doi":"10.1109/ICRITO.2017.8342495","DOIUrl":null,"url":null,"abstract":"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Analysis of IoT security at network layer\",\"authors\":\"Rahul Sharma, Nitin Pandey, S. Khatri\",\"doi\":\"10.1109/ICRITO.2017.8342495\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.\",\"PeriodicalId\":357118,\"journal\":{\"name\":\"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"125 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2017.8342495\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2017.8342495","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

连接世界的新未来是物联网设备,它将异构对象相互连接。这些物联网设备将创造一个自主的世界,能够实时交换信息并做出决策。但由于这些设备非常小,因此它们受到内存、处理、电池供电和资源的限制,因此物联网设备受到攻击的可能性比普通设备要大。为了克服这个问题,这些物联网设备在每层使用轻量级协议和标准。在网络层,6LoWPAN和RPL是将数据从一个设备传输到另一个设备的两个主要协议。本文重点分析了6LoWPAN和RPL的不同攻击类型,并提出了一种新的解决方案,以防止增加等级攻击的循环和资源消耗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of IoT security at network layer
The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信